Pub Date : 2024-08-01DOI: 10.1016/j.dcan.2024.06.002
Utilizing multi-band and multi-carrier techniques enhances throughput and capacity in Long-Term Evolution (LTE)-Advanced and 5G New Radio (NR) mobile networks. However, these techniques introduce Passive Inter-Modulation (PIM) interference in Frequency-Division Duplexing (FDD) systems. In this paper, a novel multi-band Wiener-Hammerstein model is presented to digitally reconstruct PIM interference signals, thereby achieving effective PIM Cancellation (PIMC) in multi-band scenarios. In the model, transmitted signals are independently processed to simulate Inter-Modulation Distortions (IMDs) and Cross-Modulation Distortions (CMDs). Furthermore, the Finite Impulse Response (FIR) filter, basis function generation, and B-spline function are applied for precise PIM product estimation and generation in multi-band scenarios. Simulations involving 4 carrier components from diverse NR frequency bands at varying transmitting powers validate the feasibility of the model for multi-band PIMC, achieving up to 19 dB in PIMC performance. Compared to other models, this approach offers superior PIMC performance, exceeding them by more than 5 dB in high transmitting power scenarios. Additionally, its lower sampling rate requirement reduces the hardware complexity associated with implementing multi-band PIMC.
{"title":"Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model","authors":"","doi":"10.1016/j.dcan.2024.06.002","DOIUrl":"10.1016/j.dcan.2024.06.002","url":null,"abstract":"<div><p>Utilizing multi-band and multi-carrier techniques enhances throughput and capacity in Long-Term Evolution (LTE)-Advanced and 5G New Radio (NR) mobile networks. However, these techniques introduce Passive Inter-Modulation (PIM) interference in Frequency-Division Duplexing (FDD) systems. In this paper, a novel multi-band Wiener-Hammerstein model is presented to digitally reconstruct PIM interference signals, thereby achieving effective PIM Cancellation (PIMC) in multi-band scenarios. In the model, transmitted signals are independently processed to simulate Inter-Modulation Distortions (IMDs) and Cross-Modulation Distortions (CMDs). Furthermore, the Finite Impulse Response (FIR) filter, basis function generation, and B-spline function are applied for precise PIM product estimation and generation in multi-band scenarios. Simulations involving 4 carrier components from diverse NR frequency bands at varying transmitting powers validate the feasibility of the model for multi-band PIMC, achieving up to 19 dB in PIMC performance. Compared to other models, this approach offers superior PIMC performance, exceeding them by more than 5 dB in high transmitting power scenarios. Additionally, its lower sampling rate requirement reduces the hardware complexity associated with implementing multi-band PIMC.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864824000695/pdfft?md5=2a6267187794fafdb2d9a61eec6727df&pid=1-s2.0-S2352864824000695-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.dcan.2022.11.014
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network. The employed computing power carries out the pool mining attacks on the attacked mining pool. To realize the win-win game between the malicious mining pool and the employee, the paper proposes an Employment Attack Pricing Algorithm (EAPA) of mining pools in blockchain based on game theory. In the EAPA, the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack, the revenue increment of malicious mining pools, and the revenue of the employee. It establishes a game model between the malicious mining pool and the employee under the employment attack. Then, the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation. In the strategy, the malicious mining pool analyzes the conditions for the employment attack, and uses the derivative method to find the optimal utilization value of computing power, employees analyze the conditions for accepting employment, and use the derivative method to find the optimal reward value of computing power. Finally, the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation. The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee. The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time. The EAPA outperforms the state-of-the-art methods such as SPSUCP, DPSACP, and FPSUCP.
{"title":"Game theory attack pricing for mining pools in blockchain-based IoT","authors":"","doi":"10.1016/j.dcan.2022.11.014","DOIUrl":"10.1016/j.dcan.2022.11.014","url":null,"abstract":"<div><p>The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network. The employed computing power carries out the pool mining attacks on the attacked mining pool. To realize the win-win game between the malicious mining pool and the employee, the paper proposes an Employment Attack Pricing Algorithm (EAPA) of mining pools in blockchain based on game theory. In the EAPA, the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack, the revenue increment of malicious mining pools, and the revenue of the employee. It establishes a game model between the malicious mining pool and the employee under the employment attack. Then, the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation. In the strategy, the malicious mining pool analyzes the conditions for the employment attack, and uses the derivative method to find the optimal utilization value of computing power, employees analyze the conditions for accepting employment, and use the derivative method to find the optimal reward value of computing power. Finally, the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation. The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee. The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time. The EAPA outperforms the state-of-the-art methods such as SPSUCP, DPSACP, and FPSUCP.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002553/pdfft?md5=26d0202549bef1c7dbcc7244a08559ea&pid=1-s2.0-S2352864822002553-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44821926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.dcan.2022.10.027
Normally, in the downlink Network-Coded Multiple Access (NCMA) system, the same power is allocated to different users. However, equal power allocation is unsuitable for some scenarios, such as when user devices have different Quality of Service (QoS) requirements. Hence, we study the power allocation in the downlink NCMA system in this paper, and propose a downlink Network-Coded Multiple Access with Diverse Power (NCMA-DP), wherein different amounts of power are allocated to different users. In terms of the Bit Error Rate (BER) of the multi-user decoder, and the number of packets required to correctly decode the message, the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA (NCMA-C). Meanwhile, the performance of the user with less allocated power is still much better than NCMA-C. Furthermore, the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C. The simulation results demonstrate the remarkable performance of the proposed NCMA-DP.
{"title":"Downlink network-coded multiple access with diverse power","authors":"","doi":"10.1016/j.dcan.2022.10.027","DOIUrl":"10.1016/j.dcan.2022.10.027","url":null,"abstract":"<div><p>Normally, in the downlink Network-Coded Multiple Access (NCMA) system, the same power is allocated to different users. However, equal power allocation is unsuitable for some scenarios, such as when user devices have different Quality of Service (QoS) requirements. Hence, we study the power allocation in the downlink NCMA system in this paper, and propose a downlink Network-Coded Multiple Access with Diverse Power (NCMA-DP), wherein different amounts of power are allocated to different users. In terms of the Bit Error Rate (BER) of the multi-user decoder, and the number of packets required to correctly decode the message, the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA (NCMA-C). Meanwhile, the performance of the user with less allocated power is still much better than NCMA-C. Furthermore, the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C. The simulation results demonstrate the remarkable performance of the proposed NCMA-DP.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S235286482200236X/pdfft?md5=9a8868063353e0d03e969a256e61f770&pid=1-s2.0-S235286482200236X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47509564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.dcan.2022.10.023
We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks (WLANs) in the presence of path loss, Rayleigh fading and log-normal shadowing. For a data packet transmission, we formulate an optimization problem, solve the problem, and propose a rate and transmission power adaptation scheme with a restriction methodology of data packet transmission for achieving the optimal energy efficiency. In the restriction methodology of data packet transmission, a user does not transmit a data packet if the instantaneous channel gain of the user is lower than a threshold. To evaluate the performance of the proposed scheme, we develop analytical models for computing the throughput and energy efficiency of WLANs under the proposed scheme considering a saturation traffic condition. We then validate the analytical models via simulation. We find that the proposed scheme provides better throughput and energy efficiency with acceptable throughput fairness if the restriction methodology of data packet transmission is included. By means of the analytical models and simulations, we demonstrate that the proposed scheme provides significantly higher throughput, energy efficiency and fairness index than a traditional non-adaptive scheme and an existing most relevant adaptive scheme. Throughput and energy efficiency gains obtained by the proposed scheme with respect to the existing adapting scheme are about 75% and 103%, respectively, for a fairness index of 0.8. We also study the effect of various system parameters on throughput and energy efficiency and provide various engineering insights.
{"title":"Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing","authors":"","doi":"10.1016/j.dcan.2022.10.023","DOIUrl":"10.1016/j.dcan.2022.10.023","url":null,"abstract":"<div><p>We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks (WLANs) in the presence of path loss, Rayleigh fading and log-normal shadowing. For a data packet transmission, we formulate an optimization problem, solve the problem, and propose a rate and transmission power adaptation scheme with a restriction methodology of data packet transmission for achieving the optimal energy efficiency. In the restriction methodology of data packet transmission, a user does not transmit a data packet if the instantaneous channel gain of the user is lower than a threshold. To evaluate the performance of the proposed scheme, we develop analytical models for computing the throughput and energy efficiency of WLANs under the proposed scheme considering a saturation traffic condition. We then validate the analytical models via simulation. We find that the proposed scheme provides better throughput and energy efficiency with acceptable throughput fairness if the restriction methodology of data packet transmission is included. By means of the analytical models and simulations, we demonstrate that the proposed scheme provides significantly higher throughput, energy efficiency and fairness index than a traditional non-adaptive scheme and an existing most relevant adaptive scheme. Throughput and energy efficiency gains obtained by the proposed scheme with respect to the existing adapting scheme are about 75% and 103%, respectively, for a fairness index of 0.8. We also study the effect of various system parameters on throughput and energy efficiency and provide various engineering insights.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002322/pdfft?md5=88dd677b739ec634fe4b8f3902ed5480&pid=1-s2.0-S2352864822002322-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.dcan.2023.01.004
To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion, a series of discussions on network security issues are carried out based on game theory. From the perspective of the life cycle of network vulnerabilities, mining and repairing vulnerabilities are analyzed by applying evolutionary game theory. The evolution process of knowledge sharing among white hats under various conditions is simulated, and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed. On this basis, the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm (WCA) to produce better replacement individuals with greater probability from the perspective of both attack and defense. Through the simulation experiment, it is found that the convergence speed of the probability (X) of white Hat 1 choosing the knowledge sharing policy is related to the probability (x0) of white Hat 2 choosing the knowledge sharing policy initially, and the probability (y0) of white hat 2 choosing the knowledge sharing policy initially. When y0 = 0.9, X converges rapidly in a relatively short time. When y0 is constant and x0 is small, the probability curve of the “cooperative development” strategy converges to 0. It is concluded that the higher the trust among the white hat members in the temporary team, the stronger their willingness to share knowledge, which is conducive to the mining of loopholes in the system. The greater the probability of a hacker attacking the vulnerability before it is fully disclosed, the lower the willingness of manufacturers to choose the "cooperative development" of vulnerability patches. Applying the improved wolf colony-co-evolution algorithm can obtain the equilibrium solution of the "attack and defense game model", and allocate the security protection resources according to the importance of nodes. This study can provide an effective solution to protect the network security for digital twins in the industry.
{"title":"Game theory in network security for digital twins in industry","authors":"","doi":"10.1016/j.dcan.2023.01.004","DOIUrl":"10.1016/j.dcan.2023.01.004","url":null,"abstract":"<div><p>To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion, a series of discussions on network security issues are carried out based on game theory. From the perspective of the life cycle of network vulnerabilities, mining and repairing vulnerabilities are analyzed by applying evolutionary game theory. The evolution process of knowledge sharing among white hats under various conditions is simulated, and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed. On this basis, the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm (WCA) to produce better replacement individuals with greater probability from the perspective of both attack and defense. Through the simulation experiment, it is found that the convergence speed of the probability (<em>X</em>) of white Hat 1 choosing the knowledge sharing policy is related to the probability (<em>x</em><sub>0</sub>) of white Hat 2 choosing the knowledge sharing policy initially, and the probability (<em>y</em><sub>0</sub>) of white hat 2 choosing the knowledge sharing policy initially. When <em>y</em><sub>0</sub> = 0.9, <em>X</em> converges rapidly in a relatively short time. When <em>y</em><sub>0</sub> is constant and <em>x</em><sub>0</sub> is small, the probability curve of the “cooperative development” strategy converges to 0. It is concluded that the higher the trust among the white hat members in the temporary team, the stronger their willingness to share knowledge, which is conducive to the mining of loopholes in the system. The greater the probability of a hacker attacking the vulnerability before it is fully disclosed, the lower the willingness of manufacturers to choose the \"cooperative development\" of vulnerability patches. Applying the improved wolf colony-co-evolution algorithm can obtain the equilibrium solution of the \"attack and defense game model\", and allocate the security protection resources according to the importance of nodes. This study can provide an effective solution to protect the network security for digital twins in the industry.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000172/pdfft?md5=e4bd0604e0a430227120098d1040c077&pid=1-s2.0-S2352864823000172-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48849586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.dcan.2022.10.022
In this paper, we analyze a hybrid Heterogeneous Cellular Network (HCNet) framework by deploying millimeter Wave (mmWave) small cells with coexisting traditional sub-6GHz macro cells to achieve improved coverage and high data rate. We consider randomly-deployed macro base stations throughout the network whereas mmWave Small Base Stations (SBSs) are deployed in the areas with high User Equipment (UE) density. Such user centric deployment of mmWave SBSs inevitably incurs correlation between UE and SBSs. For a realistic scenario where the UEs are distributed according to Poisson cluster process and directional beamforming with line-of-sight and non-line-of-sight transmissions is adopted for mmWave communication. By using tools from stochastic geometry, we develop an analytical framework to analyze various performance metrics in the downlink hybrid HCNets under biased received power association. For UE clustering we considered Thomas cluster process and derive expressions for the association probability, coverage probability, area spectral efficiency, and energy efficiency. We also provide Monte Carlo simulation results to validate the accuracy of the derived expressions. Furthermore, we analyze the impact of mmWave operating frequency, antenna gain, small cell biasing, and BSs density to get useful engineering insights into the performance of hybrid mmWave HCNets. Our results show that network performance is significantly improved by deploying millimeter wave SBS instead of microwave BS in hot spots.
本文分析了一种混合异构蜂窝网络(HCNet)框架,通过部署毫米波(mmWave)小基站与共存的传统 6GHz 以下宏基站,实现更好的覆盖和更高的数据传输速率。我们考虑在整个网络中随机部署宏基站,而毫米波小基站(SBS)则部署在用户设备(UE)密度高的区域。这种以用户为中心的毫米波 SBS 部署不可避免地会在 UE 和 SBS 之间产生相关性。在现实场景中,UE 按照泊松集群过程分布,毫米波通信采用视距和非视距传输的定向波束成形。通过使用随机几何工具,我们开发了一个分析框架,用于分析下行链路混合 HCNets 在有偏差的接收功率关联下的各种性能指标。对于 UE 聚类,我们考虑了托马斯聚类过程,并推导出了关联概率、覆盖概率、区域频谱效率和能效的表达式。我们还提供了蒙特卡罗模拟结果,以验证推导表达式的准确性。此外,我们还分析了毫米波工作频率、天线增益、小基站偏置和基站密度的影响,从而获得了有关混合毫米波 HCN 网络性能的有用工程见解。我们的研究结果表明,在热点地区部署毫米波 SBS 而不是微波 BS 可以显著提高网络性能。
{"title":"Hybrid millimeter wave heterogeneous networks with spatially correlated user equipment","authors":"","doi":"10.1016/j.dcan.2022.10.022","DOIUrl":"10.1016/j.dcan.2022.10.022","url":null,"abstract":"<div><p>In this paper, we analyze a hybrid Heterogeneous Cellular Network (HCNet) framework by deploying millimeter Wave (mmWave) small cells with coexisting traditional sub-6GHz macro cells to achieve improved coverage and high data rate. We consider randomly-deployed macro base stations throughout the network whereas mmWave Small Base Stations (SBSs) are deployed in the areas with high User Equipment (UE) density. Such user centric deployment of mmWave SBSs inevitably incurs correlation between UE and SBSs. For a realistic scenario where the UEs are distributed according to Poisson cluster process and directional beamforming with line-of-sight and non-line-of-sight transmissions is adopted for mmWave communication. By using tools from stochastic geometry, we develop an analytical framework to analyze various performance metrics in the downlink hybrid HCNets under biased received power association. For UE clustering we considered Thomas cluster process and derive expressions for the association probability, coverage probability, area spectral efficiency, and energy efficiency. We also provide Monte Carlo simulation results to validate the accuracy of the derived expressions. Furthermore, we analyze the impact of mmWave operating frequency, antenna gain, small cell biasing, and BSs density to get useful engineering insights into the performance of hybrid mmWave HCNets. Our results show that network performance is significantly improved by deploying millimeter wave SBS instead of microwave BS in hot spots.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002310/pdfft?md5=973cc82a3f5ad2909702271a161a3652&pid=1-s2.0-S2352864822002310-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42234446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.dcan.2023.01.020
Distinguishing between web traffic generated by bots and humans is an important task in the evaluation of online marketing campaigns. One of the main challenges is related to only partial availability of the performance metrics: although some users can be unambiguously classified as bots, the correct label is uncertain in many cases. This calls for the use of classifiers capable of explaining their decisions. This paper demonstrates two such mechanisms based on features carefully engineered from web logs. The first is a man-made rule-based system. The second is a hierarchical model that first performs clustering and next classification using human-centred, interpretable methods. The stability of the proposed methods is analyzed and a minimal set of features that convey the class-discriminating information is selected. The proposed data processing and analysis methodology are successfully applied to real-world data sets from online publishers.
{"title":"Data-driven human and bot recognition from web activity logs based on hybrid learning techniques","authors":"","doi":"10.1016/j.dcan.2023.01.020","DOIUrl":"10.1016/j.dcan.2023.01.020","url":null,"abstract":"<div><p>Distinguishing between web traffic generated by bots and humans is an important task in the evaluation of online marketing campaigns. One of the main challenges is related to only partial availability of the performance metrics: although some users can be unambiguously classified as bots, the correct label is uncertain in many cases. This calls for the use of classifiers capable of explaining their decisions. This paper demonstrates two such mechanisms based on features carefully engineered from web logs. The first is a man-made rule-based system. The second is a hierarchical model that first performs clustering and next classification using human-centred, interpretable methods. The stability of the proposed methods is analyzed and a minimal set of features that convey the class-discriminating information is selected. The proposed data processing and analysis methodology are successfully applied to real-world data sets from online publishers.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000330/pdfft?md5=7b3f54c3278291b4e66a9f8a51c80437&pid=1-s2.0-S2352864823000330-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42752038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.dcan.2023.01.002
The advent of Network Function Virtualization (NFV) and Service Function Chains (SFCs) unleashes the power of dynamic creation of network services using Virtual Network Functions (VNFs). This is of great interest to network operators since poor service quality and resource wastage can potentially hurt their revenue in the long term. However, the study shows with a set of test-bed experiments that packet loss at certain positions (i.e., different VNFs) in an SFC can cause various degrees of resource wastage and performance degradation because of repeated upstream processing and transmission of retransmitted packets.
To overcome this challenge, this study focuses on resource scheduling and deployment of SFCs while considering packet loss positions. This study developed a novel SFC packet dropping cost model and formulated an SFC scheduling problem that aims to minimize overall packet dropping cost as a Mixed-Integer Linear Programming (MILP) and proved that it is NP-hard. In this study, Palos is proposed as an efficient scheme in exploiting the functional characteristics of VNFs and their positions in SFCs for scheduling resources and deployment to optimize packet dropping cost. Extensive experiment results show that Palos can achieve up to 42.73% improvement on packet dropping cost and up to 33.03% reduction on average SFC latency when compared with two other state-of-the-art schemes.
{"title":"Position-aware packet loss optimization on service function chain placement","authors":"","doi":"10.1016/j.dcan.2023.01.002","DOIUrl":"10.1016/j.dcan.2023.01.002","url":null,"abstract":"<div><p>The advent of Network Function Virtualization (NFV) and Service Function Chains (SFCs) unleashes the power of dynamic creation of network services using Virtual Network Functions (VNFs). This is of great interest to network operators since poor service quality and resource wastage can potentially hurt their revenue in the long term. However, the study shows with a set of test-bed experiments that packet loss at certain positions (i.e., different VNFs) in an SFC can cause various degrees of resource wastage and performance degradation because of repeated upstream processing and transmission of retransmitted packets.</p><p>To overcome this challenge, this study focuses on resource scheduling and deployment of SFCs while considering packet loss positions. This study developed a novel SFC packet dropping cost model and formulated an SFC scheduling problem that aims to minimize overall packet dropping cost as a Mixed-Integer Linear Programming (MILP) and proved that it is NP-hard. In this study, <em>Palos</em> is proposed as an efficient scheme in exploiting the functional characteristics of VNFs and their positions in SFCs for scheduling resources and deployment to optimize packet dropping cost. Extensive experiment results show that <em>Palos</em> can achieve up to 42.73% improvement on packet dropping cost and up to 33.03% reduction on average SFC latency when compared with two other state-of-the-art schemes.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000160/pdfft?md5=f29887ba5852bc0c526d0fa622929345&pid=1-s2.0-S2352864823000160-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48388018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.dcan.2022.10.019
Nowadays, Internet of Things (IoT) is widely deployed and brings great opportunities to change people's daily life. To realize more effective human-computer interaction in the IoT applications, the Question Answering (QA) systems implanted in the IoT services are supposed to improve the ability to understand natural language. Therefore, the distributed representation of words, which contains more semantic or syntactic information, has been playing a more and more important role in the QA systems. However, learning high-quality distributed word vectors requires lots of storage and computing resources, hence it cannot be deployed on the resource-constrained IoT devices. It is a good choice to outsource the data and computation to the cloud servers. Nevertheless, it could cause privacy risks to directly upload private data to the untrusted cloud. Therefore, realizing the word vector learning process over untrusted cloud servers without privacy leakage is an urgent and challenging task. In this paper, we present a novel efficient word vector learning scheme over encrypted data. We first design a series of arithmetic computation protocols. Then we use two non-colluding cloud servers to implement high-quality word vectors learning over encrypted data. The proposed scheme allows us to perform training word vectors on the remote cloud servers while protecting privacy. Security analysis and experiments over real data sets demonstrate that our scheme is more secure and efficient than existing privacy-preserving word vector learning schemes.
{"title":"Towards privacy-preserving and efficient word vector learning for lightweight IoT devices","authors":"","doi":"10.1016/j.dcan.2022.10.019","DOIUrl":"10.1016/j.dcan.2022.10.019","url":null,"abstract":"<div><p>Nowadays, Internet of Things (IoT) is widely deployed and brings great opportunities to change people's daily life. To realize more effective human-computer interaction in the IoT applications, the Question Answering (QA) systems implanted in the IoT services are supposed to improve the ability to understand natural language. Therefore, the distributed representation of words, which contains more semantic or syntactic information, has been playing a more and more important role in the QA systems. However, learning high-quality distributed word vectors requires lots of storage and computing resources, hence it cannot be deployed on the resource-constrained IoT devices. It is a good choice to outsource the data and computation to the cloud servers. Nevertheless, it could cause privacy risks to directly upload private data to the untrusted cloud. Therefore, realizing the word vector learning process over untrusted cloud servers without privacy leakage is an urgent and challenging task. In this paper, we present a novel efficient word vector learning scheme over encrypted data. We first design a series of arithmetic computation protocols. Then we use two non-colluding cloud servers to implement high-quality word vectors learning over encrypted data. The proposed scheme allows us to perform training word vectors on the remote cloud servers while protecting privacy. Security analysis and experiments over real data sets demonstrate that our scheme is more secure and efficient than existing privacy-preserving word vector learning schemes.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002280/pdfft?md5=69163c8cc8c0fd1dd38ce15845d9e704&pid=1-s2.0-S2352864822002280-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1016/j.dcan.2023.01.018
Hybrid precoding is considered as a promising low-cost technique for millimeter wave (mm-wave) massive Multi-Input Multi-Output (MIMO) systems. In this work, referring to the time-varying propagation circumstances, with semi-supervised Incremental Learning (IL), we propose an online hybrid beamforming scheme. Firstly, given the constraint of constant modulus on analog beamformer and combiner, we propose a new broad-network-based structure for the design model of hybrid beamforming. Compared with the existing network structure, the proposed network structure can achieve better transmission performance and lower complexity. Moreover, to enhance the efficiency of IL further, by combining the semi-supervised graph with IL, we propose a hybrid beamforming scheme based on chunk-by-chunk semi-supervised learning, where only few transmissions are required to calculate the label and all other unlabelled transmissions would also be put into a training data chunk. Unlike the existing single-by-single approach where transmissions during the model update are not taken into the consideration of model update, all transmissions, even the ones during the model update, would make contributions to model update in the proposed method. During the model update, the amount of unlabelled transmissions is very large and they also carry some information, the prediction performance can be enhanced to some extent by these unlabelled channel data. Simulation results demonstrate the spectral efficiency of the proposed method outperforms that of the existing single-by-single approach. Besides, we prove the general complexity of the proposed method is lower than that of the existing approach and give the condition under which its absolute complexity outperforms that of the existing approach.
在毫米波(mm-wave)大规模多输入多输出(MIMO)系统中,混合预编码被认为是一种前景广阔的低成本技术。在这项工作中,我们针对时变传播环境,通过半监督增量学习(IL),提出了一种在线混合波束成形方案。首先,考虑到模拟波束成形器和合路器模数恒定的约束条件,我们提出了一种新的基于宽网络结构的混合波束成形设计模型。与现有的网络结构相比,所提出的网络结构能实现更好的传输性能和更低的复杂度。此外,为了进一步提高 IL 的效率,我们将半监督图与 IL 结合起来,提出了一种基于逐块半监督学习的混合波束成形方案,在这种方案中,只需要少量传输来计算标签,其他所有未标记的传输也将被放入一个训练数据块中。与现有的单次方法不同的是,在模型更新过程中的传输不会被纳入模型更新的考虑范围,而在建议的方法中,所有传输,即使是模型更新过程中的传输,都会对模型更新做出贡献。在模型更新过程中,未标记的传输量非常大,它们也携带了一些信息,这些未标记的信道数据可以在一定程度上提高预测性能。仿真结果表明,所提方法的频谱效率优于现有的逐单方法。此外,我们还证明了所提方法的一般复杂度低于现有方法,并给出了其绝对复杂度优于现有方法的条件。
{"title":"Semi-supervised learning based hybrid beamforming under time-varying propagation environments","authors":"","doi":"10.1016/j.dcan.2023.01.018","DOIUrl":"10.1016/j.dcan.2023.01.018","url":null,"abstract":"<div><p>Hybrid precoding is considered as a promising low-cost technique for millimeter wave (mm-wave) massive Multi-Input Multi-Output (MIMO) systems. In this work, referring to the time-varying propagation circumstances, with semi-supervised Incremental Learning (IL), we propose an online hybrid beamforming scheme. Firstly, given the constraint of constant modulus on analog beamformer and combiner, we propose a new broad-network-based structure for the design model of hybrid beamforming. Compared with the existing network structure, the proposed network structure can achieve better transmission performance and lower complexity. Moreover, to enhance the efficiency of IL further, by combining the semi-supervised graph with IL, we propose a hybrid beamforming scheme based on chunk-by-chunk semi-supervised learning, where only few transmissions are required to calculate the label and all other unlabelled transmissions would also be put into a training data chunk. Unlike the existing single-by-single approach where transmissions during the model update are not taken into the consideration of model update, all transmissions, even the ones during the model update, would make contributions to model update in the proposed method. During the model update, the amount of unlabelled transmissions is very large and they also carry some information, the prediction performance can be enhanced to some extent by these unlabelled channel data. Simulation results demonstrate the spectral efficiency of the proposed method outperforms that of the existing single-by-single approach. Besides, we prove the general complexity of the proposed method is lower than that of the existing approach and give the condition under which its absolute complexity outperforms that of the existing approach.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000317/pdfft?md5=15e51103139c8d2d6b5c8e5d6603104c&pid=1-s2.0-S2352864823000317-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47745189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}